An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor Equipment
Abstract
:1. Introduction
2. Background and Related Research
3. Log Analysis System Configuration and DB Design
3.1. Configuration of EventLogs
- Record the contents of all user actions in the UI. For example, the operator starts or stops Lot with the manual and records everything he or she looks upon a particular screen.
- Records the events that occurred for all modules. For example, if you open and close the valve of an installation or run a command to raise the temperature to a certain temperature, you will record the information in the EventLog that increases the temperature.
- In the EventLog, information about failures in the event of a facility failure and in the event of a failure resolution are also stored.
- Records all information related to scheduler behavior.
- Displays information about each module operating situation.
- Log Time: The Log Time indicated the time stamp when the CTC server receives the event and records the logging on the log file.
- Issue Time: The issue time indicates the time stamp when the issuer reports the events.
- Event ID: Each event has a specific eventID and this ID section shows a number of it.
- Name: It is an identifier of the parent category of each event.
- Issuer: Each event is published by each issuer, and the issuer can be either device level or image level.
- Event Text: Event Text provides more detailed information about which event has occurred.
3.2. Architecture Design
3.3. Configuration of PostgreSQL and Timescledb
4. Experiment and Results
4.1. Experiment Environment
- Save the EventLog file in DB.
- Using R Code, we figured out data properties while drawing various pictures in the DB.
- The experiment was carried out by grouping into several groups.
- Checked the data of several files in a row.
4.2. ASCII vs. TDMS Comparison Result
4.3. EventLog Visualization Results
- Expressing the Frequency of Event Occurrence by Module:As shown in Figure 8, The subject generating the event is recorded in the EventLog, and it was designated as an issuer. If it draws the cumulative chart for each event issuer, it can yield the following screen. This type can be used in various ways. For example, you can view alarms by type in the Alarm Log, and you can also check the total number of alarms.
- Expressing the Amount of Change Over Time:There are cases where one needs to monitor how parameters change over time as shown in Figure 9. For example, it is crucial to managing the accumulated Radio Frequency (RF) On-time in the process chamber in Etch equipment. In this case, it is possible to draw a trend chart as follows by overlapping several EventLogs and displaying several parameters together.
- Monitoring Success and Failure by Period:A macro is a kind of script that automatically checks things that have been manually checked by the operator in the equipment. Some of these macros are executed daily, and there are cases where macros are executed under certain conditions. We can check whether the executed macro was executed typically or was abnormally terminated. Pass or Fail information may be utilized as a future monitoring feature as in Figure 10. It can be used to monitor the entire equipment and to monitor the equipment that frequently fails.
- WaferMap; Map information about wafers is stored in the EventLog, and a WaferMap can also be drawn using this information. WaferMap information is vital information. With this information, if it can draw a map before and after the process proceeds, it can judge the process result through the wafer map as in Figure 11. These Map data can also be used to compare before and after Etch.
- Check the Idle Section: In semiconductor equipment, the event when the recipe starts and ends is recorded. If we express this below, we can check where the chamber is idle. If we mark the start and end parts at the beginning and end of the recipe and expand to information of recipe parameters for each step, we can analyze how the equipment operated at that time. In addition, it is possible to compare why the delay between two or more pieces of equipment occurs by using this information. The equipment performance degradation can be analyzed by checking and analyzing the delayed section until the recipe starts and ends. It can also compare the data between two equipment with differences in throughput to see the delay interval. Through visualization, it can easily find the section where Idle occurs as in Figure 12.
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- He, P.; Zhu, J.; He, S.; Li, J.; Lyu, M.R. Towards automated log parsing for large-scale log data analysis. IEEE Trans. Dependable Secur. Comput. 2017, 15, 931–944. [Google Scholar] [CrossRef]
- Kent, K.; Souppaya, M. Guide to computer security log management. NIST Spec. Publ. 2006, 92, 1–72. [Google Scholar]
- Yuan, Y.; Zhou, S.; Sievenpiper, C.; Mannar, K.; Zheng, Y. Event log modeling and analysis for system failure prediction. IIE Trans. 2011, 43, 647–660. [Google Scholar] [CrossRef]
- Gainaru, A.; Cappello, F.; Trausan-Matu, S.; Kramer, B. Event log mining tool for large scale HPC systems. In Proceedings of the European Conference on Parallel Processing, Rhodos, Greece, 2 September 2011; pp. 52–64. [Google Scholar]
- Liu, C.; Pei, Y.; Zeng, Q.; Duan, H. LogRank: An approach to sample business process event log for efficient discovery. In Proceedings of the International Conference on Knowledge Science, Engineering and Management, Changchun, China, 17–19 August 2018; pp. 415–425. [Google Scholar]
- Dumais, S.; Jeffries, R.; Russell, D.M.; Tang, D.; Teevan, J. Understanding user behavior through log data and analysis. In Ways of Knowing in HCI; Springer: Berlin/Heidelberg, Germany, 2014; pp. 349–372. [Google Scholar]
- Bright, C.; Logan, W. Selecting the right data storage approach for an automatic test system. In Proceedings of the 2008 IEEE AUTOTESTCON, Salt Lake City, UT, USA, 8–11 September 2008; pp. 490–492. [Google Scholar]
- Oliner, A.; Ganapathi, A.; Xu, W. Advances and Challenges in Log Analysis: Logs contain a wealth of information for help in managing systems. Queue 2011, 9, 30–40. [Google Scholar] [CrossRef] [Green Version]
- Skibiński, P.; Swacha, J. Fast and efficient log file compression. In Proceedings of the 11th East-European Conference on Advances in Databases and Information Systems (ADBIS), ADBIS 2007, Varna, Bulgaria, 29 September–3 October 2007; pp. 330–342. [Google Scholar]
- Burrows, M.; Jerian, C.; Lampson, B.; Mann, T. On-line data compression in a log-structured file system. ACM SIGPLAN Not. 1992, 27, 2–9. [Google Scholar] [CrossRef]
- Hätönen, K.; Boulicaut, J.F.; Klemettinen, M.; Miettinen, M.; Masson, C. Comprehensive log compression with frequent patterns. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery, Prague, Czech Republic, 3–5 September 2003; pp. 360–370. [Google Scholar]
- Zhu, J.; He, S.; Liu, J.; He, P.; Xie, Q.; Zheng, Z.; Lyu, M.R. Tools and benchmarks for automated log parsing. In Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Montreal, QC, Canada, 25–31 May 2019; pp. 121–130. [Google Scholar]
- He, P.; Zhu, J.; He, S.; Li, J.; Lyu, M.R. An evaluation study on log parsing and its use in log mining. In Proceedings of the 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, 28 June–1 July 2016; pp. 654–661. [Google Scholar]
- Nagaraj, K.; Killian, C.; Neville, J. Structured comparative analysis of systems logs to diagnose performance problems. In Proceedings of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12), San Jose, CA, USA, 25–27 April 2012; pp. 353–366. [Google Scholar]
- Khatuya, S.; Ganguly, N.; Basak, J.; Bharde, M.; Mitra, B. Adele: Anomaly detection from event log empiricism. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 2114–2122. [Google Scholar]
- Makanju, A.; Zincir-Heywood, A.N.; Milios, E.E. Investigating event log analysis with minimum apriori information. In Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, 27–31 May 2013; pp. 962–968. [Google Scholar]
- Fahrenkrog-Petersen, S.A.; van der Aa, H.; Weidlich, M. PRETSA: Event log sanitization for privacy-aware process discovery. In Proceedings of the 2019 International Conference on Process Mining (ICPM), Aachen, Germany, 24–26 June 2019; pp. 1–8. [Google Scholar]
- Li, T.; Jiang, Y.; Zeng, C.; Xia, B.; Liu, Z.; Zhou, W.; Zhu, X.; Wang, W.; Zhang, L.; Wu, J.; et al. FLAP: An end-to-end event log analysis platform for system management. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, 13–17 August 2017; pp. 1547–1556. [Google Scholar]
- Makanju, A.; Brooks, S.; Zincir-Heywood, A.N.; Milios, E.E. Logview: Visualizing event log clusters. In Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust, Fredericton, NB, Canada, 1–3 October 2008; pp. 99–108. [Google Scholar]
- Shengyan, S.; Xiaoliu, S.; Jianbao, Z.; Xinke, M. Research on system logs collection and analysis model of the network and information security system by using multi-agent technology. In Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2–4 November 2012; pp. 23–26. [Google Scholar]
- Zhuge, C.; Vaarandi, R. Efficient Event Log Mining with LogClusterC. In Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (Bigdatasecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, 26–28 May 2017; pp. 261–266. [Google Scholar]
- van Hee, K.M.; Liu, Z.; Sidorova, N. Is my event log complete?—A probabilistic approach to process mining. In Proceedings of the 2011 Fifth International Conference on Research Challenges in Information Science, Gosier, France, 19–21 May 2011; pp. 1–12. [Google Scholar]
- Suriadi, S.; Andrews, R.; ter Hofstede, A.H.; Wynn, M.T. Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Inf. Syst. 2017, 64, 132–150. [Google Scholar] [CrossRef]
- Kim, K.P. Functional integration with process mining and process analyzing for structural and behavioral properness validation of processes discovered from event log datasets. Appl. Sci. 2020, 10, 1493. [Google Scholar] [CrossRef] [Green Version]
- Atzmueller, M.; Bloemheuvel, S.; Kloepper, B. A Framework for Human-Centered Exploration of Complex Event Log Graphs. In Proceedings of the International Conference on Discovery Science, Split, Croatia, 28–30 October 2019; pp. 335–350. [Google Scholar]
- Humphries, C.; Prigent, N.; Bidan, C.; Majorczyk, F. Elvis: Extensible log visualization. In Proceedings of the Tenth Workshop on Visualization for Cyber Security, Vancouver, BC, Canada, 23 October 2013; pp. 9–16. [Google Scholar]
- Koike, H.; Ohno, K. SnortView: Visualization system of snort logs. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, 29 October 2004; pp. 143–147. [Google Scholar]
- Bauer, M.; Fahrenkrog-Petersen, S.A.; Koschmider, A.; Mannhardt, F.; van der Aa, H.; Weidlich, M. ELPaaS: Event Log Privacy as a Service. BPM (PhD/Demos). 2019. pp. 159–163. Available online: https://hanvanderaa.com/wp-content/uploads/2019/07/BPMDemo2019-ELPaaS-Event-Log-Privacy-as-a-Service.pdf (accessed on 24 May 2021).
- de Leoni, M.; Dündar, S. Event-log abstraction using batch session identification and clustering. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno, Czech Republic, 30 March 2020; pp. 36–44. [Google Scholar]
- Studiawan, H.; Sohel, F.; Payne, C. Automatic event log abstraction to support forensic investigation. In Proceedings of the Australasian Computer Science Week Multiconference, Melbourne, VIC, Australia, 4–6 February 2020; pp. 1–9. [Google Scholar]
- Martin, N.; Benoît, B.; Caris, A. Event log knowledge as a complementary simulation model construction input. In Proceedings of the 2014 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), Vienna, Austria, 28–30 August 2014; pp. 456–462. [Google Scholar]
- Leemans, M.; van der Aalst, W.M.; van den Brand, M.G. The Statechart Workbench: Enabling scalable software event log analysis using process mining. In Proceedings of the 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), Campobasso, Italy, 20–23 March 2018; pp. 502–506. [Google Scholar]
- Khan, S.; Parkinson, S. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach. Expert Syst. Appl. 2018, 113, 116–127. [Google Scholar] [CrossRef] [Green Version]
- Andrews, R.; van Dun, C.G.; Wynn, M.T.; Kratsch, W.; Röglinger, M.; ter Hofstede, A.H. Quality-informed semi-automated event log generation for process mining. Decis. Support Syst. 2020, 132, 113265. [Google Scholar] [CrossRef]
- Hinkka, M.; Lehto, T.; Heljanko, K. Exploiting event log event attributes in RNN based prediction. In Data-Driven Process Discovery and Analysis; Springer: Berlin/Heidelberg, Germany, 2018; pp. 67–85. [Google Scholar]
- Yang, J.; Sandström, K.; Nolte, T.; Behnam, M. Data distribution service for industrial automation. In Proceedings of the 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012), Krakow, Poland, 17–21 September 2012; pp. 1–8. [Google Scholar]
- Vyatkin, V. The IEC 61499 standard and its semantics. IEEE Ind. Electron. Mag. 2009, 3, 40–48. [Google Scholar] [CrossRef]
- Villareal, G.; Na, J.; Lee, J.; Ho, T. Advantages of using big data in semiconductor manufacturing. In Proceedings of the 2018 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC), Saratoga Springs, NY, USA, 30 April–3 May 2018; pp. 139–142. [Google Scholar]
1582 Channels (22.5 Min), 10 Hz | Unzipped [MB] | Zipped [MB] | Compression Rate |
---|---|---|---|
ASCII | 201.8 | 10.0 | 95% |
TDMS | 99.9 | 3.5 | 96% |
Size Reduction | 51% | 64% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, G.; Jeong, J. An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor Equipment. Appl. Sci. 2021, 11, 5944. https://doi.org/10.3390/app11135944
Lee G, Jeong J. An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor Equipment. Applied Sciences. 2021; 11(13):5944. https://doi.org/10.3390/app11135944
Chicago/Turabian StyleLee, Gunwoo, and Jongpil Jeong. 2021. "An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor Equipment" Applied Sciences 11, no. 13: 5944. https://doi.org/10.3390/app11135944
APA StyleLee, G., & Jeong, J. (2021). An Efficient Analytical Approach to Visualize Text-Based Event Logs for Semiconductor Equipment. Applied Sciences, 11(13), 5944. https://doi.org/10.3390/app11135944